upgrading_intersectional_feminism_with_the_hacker_class.3.eng.srt 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807
  1. 1
  2. 00:00:00,000 --> 00:00:04,720
  3. Part 3:
  4. Hacker feminism at the intersection
  5. 2
  6. 00:00:04,720 --> 00:00:10,120
  7. In Hacker Women, Sollfrank writes:
  8. "even within the cyberfeminist community,
  9. 3
  10. 00:00:10,120 --> 00:00:15,240
  11. there are only a few computer
  12. professionals and fewer nerds.
  13. 4
  14. 00:00:15,400 --> 00:00:20,800
  15. Currently most women seem to prefer to
  16. undertake politically engaged work
  17. 5
  18. 00:00:20,800 --> 00:00:25,720
  19. in a purely cultural environment
  20. and on a non-technological level.
  21. 6
  22. 00:00:25,720 --> 00:00:31,200
  23. Women are not actively influencing
  24. the development of hard- and software,
  25. 7
  26. 00:00:31,200 --> 00:00:35,760
  27. and therefore are surrendering any chance to share the related power."
  28. 8
  29. 00:00:36,200 --> 00:00:41,640
  30. That power grew to form the new dominant mode of production and took over the world,
  31. 9
  32. 00:00:41,640 --> 00:00:48,320
  33. so ignoring it is impossible but imagining
  34. a different world seems almost equally hard.
  35. 10
  36. 00:00:48,680 --> 00:00:53,120
  37. Nobody talks about cyberfeminism anymore because thats just feminism now,
  38. 11
  39. 00:00:53,360 --> 00:00:56,040
  40. Cyberspace is enmeshed with the earth
  41. 12
  42. 00:00:56,040 --> 00:01:02,280
  43. and the techno utopianism of the 1990s
  44. devolved into a full blown dystopia.
  45. 13
  46. 00:01:02,640 --> 00:01:09,000
  47. Today asking someone to quit vectoralist media can be absurdly presumptuous,
  48. 14
  49. 00:01:09,000 --> 00:01:15,240
  50. like asking a peasant to quit the feudal land or a proletarian to quit the capitalist factory.
  51. 15
  52. 00:01:15,240 --> 00:01:19,920
  53. Class domination means
  54. we really don't have a choice.
  55. 16
  56. 00:01:20,080 --> 00:01:23,280
  57. To survive we are forced
  58. to carry smartphones
  59. 17
  60. 00:01:23,280 --> 00:01:27,160
  61. that either run on iOS (owned by Apple)
  62. or Android (owned by Google)
  63. 18
  64. 00:01:27,160 --> 00:01:31,080
  65. get jobs by signing up to sites like
  66. Linked In (owned by Microsoft)
  67. 19
  68. 00:01:31,080 --> 00:01:34,840
  69. or Amazon Mechanical Turk
  70. or Uber (hosted on Amazon).
  71. 20
  72. 00:01:34,840 --> 00:01:40,160
  73. To keep our jobs we are forced to sign in to apps like Whatsapp (owned by Facebook)
  74. 21
  75. 00:01:40,160 --> 00:01:42,560
  76. and Zoom (hosted on Amazon).
  77. 22
  78. 00:01:42,760 --> 00:01:47,080
  79. We have to be liked on Instagram (owned by Facebook) or Github (owned by Microsoft)
  80. 23
  81. 00:01:47,080 --> 00:01:50,160
  82. before we can sell
  83. the fruits of our labor.
  84. 24
  85. 00:01:50,480 --> 00:01:54,840
  86. As April Glaser puts it: "Deleting Facebook is a privilege."
  87. 25
  88. 00:01:55,040 --> 00:02:00,760
  89. However, since our personal data is
  90. the source of vectoralist political power,
  91. 26
  92. 00:02:00,760 --> 00:02:07,280
  93. feminist slogan "the personal is political" becomes even more meaningful & important.
  94. 27
  95. 00:02:07,520 --> 00:02:08,880
  96. We have to make it clear
  97. 28
  98. 00:02:08,880 --> 00:02:12,000
  99. that when we invite someone to
  100. our feminist whatsapp group
  101. 29
  102. 00:02:12,000 --> 00:02:15,920
  103. and our google drive to organize our
  104. new hashtag campaign,
  105. 30
  106. 00:02:15,920 --> 00:02:17,280
  107. we are inviting them
  108. 31
  109. 00:02:17,280 --> 00:02:22,480
  110. to do voluntary work that benefits
  111. the richest white cis men in the world
  112. 32
  113. 00:02:22,480 --> 00:02:26,440
  114. like Larry Page,
  115. Elon Musk and Mark Zuckerberg.
  116. 33
  117. 00:02:26,440 --> 00:02:29,880
  118. When we invite someone
  119. to our feminist Zoom assembly,
  120. 34
  121. 00:02:29,880 --> 00:02:33,200
  122. we are inviting them to use services
  123. of a company
  124. 35
  125. 00:02:33,200 --> 00:02:36,840
  126. that infringes the freedom of assembly to Uighur and Palestinian people
  127. 36
  128. 00:02:36,840 --> 00:02:42,200
  129. on the servers of a corporation that provides Artificial Intelligence and facial recognition
  130. 37
  131. 00:02:42,200 --> 00:02:48,200
  132. to the racist police force of the country with the highest prison population in the world.
  133. 38
  134. 00:02:48,200 --> 00:02:50,680
  135. There is no good reason for using
  136. vectoralist apps
  137. 39
  138. 00:02:50,680 --> 00:02:54,440
  139. to organize ourselves and our emancipatory
  140. struggles,
  141. 40
  142. 00:02:54,440 --> 00:02:57,880
  143. because there are free open source alternatives
  144. 41
  145. 00:02:57,880 --> 00:03:00,920
  146. for almost every popular vectoralist software
  147. 42
  148. 00:03:00,920 --> 00:03:04,200
  149. and there is a federation of decentralized
  150. public servers
  151. 43
  152. 00:03:04,200 --> 00:03:08,080
  153. for free open source social media that we can use right now.
  154. 44
  155. 00:03:08,080 --> 00:03:13,520
  156. We can use IRC, Jabber, Matrix etc. instead of Whatsapp,
  157. 45
  158. 00:03:13,520 --> 00:03:15,480
  159. Nextcloud instead of Drive,
  160. 46
  161. 00:03:15,480 --> 00:03:19,200
  162. Mastodon instead of
  163. Twitter and Meet Jitsi instead of Zoom.
  164. 47
  165. 00:03:19,600 --> 00:03:24,640
  166. These FOSS apps are not just as good,
  167. but they are better,
  168. 48
  169. 00:03:24,760 --> 00:03:26,600
  170. not just ethically and politically
  171. 49
  172. 00:03:26,600 --> 00:03:30,680
  173. but also because they dont try to mess with
  174. our psychology through algorithms
  175. 50
  176. 00:03:30,680 --> 00:03:36,200
  177. and thats why they need much less resources, which is better for the earth.
  178. 51
  179. 00:03:36,480 --> 00:03:42,480
  180. As intersectional feminists we should be aware that we are all cyborg hackers
  181. 52
  182. 00:03:42,480 --> 00:03:48,200
  183. and we have different response-abilities
  184. depending on our situatedness.
  185. 53
  186. 00:03:48,520 --> 00:03:53,360
  187. Intersectional feminism upgraded with
  188. hacker class consciousness can and should
  189. 54
  190. 00:03:53,360 --> 00:03:56,000
  191. be an entry point for people to learn
  192. 55
  193. 00:03:56,000 --> 00:03:59,400
  194. how vectoralism intersects with
  195. all forms of oppression
  196. 56
  197. 00:03:59,400 --> 00:04:04,200
  198. and which tools to use for
  199. hacking them in a revolutionary way.
  200. 57
  201. 00:04:04,840 --> 00:04:09,280
  202. To begin with, we should differentiate
  203. between organization and outreach.
  204. 58
  205. 00:04:09,280 --> 00:04:13,760
  206. For the purposes of organization
  207. and for personal/political communication,
  208. 59
  209. 00:04:13,760 --> 00:04:18,480
  210. we should use free and open source
  211. software, not just because it's more secure
  212. 60
  213. 00:04:18,480 --> 00:04:21,320
  214. but also for liberating ourselves from vectoralist exploitation
  215. 61
  216. 00:04:21,320 --> 00:04:23,360
  217. and empowering each other.
  218. 62
  219. 00:04:23,600 --> 00:04:28,600
  220. For outreach it might still make sense
  221. to use vectoralist platforms
  222. 63
  223. 00:04:28,600 --> 00:04:32,520
  224. until most of the population is not there anymore
  225. 64
  226. 00:04:32,520 --> 00:04:35,920
  227. but doing this successfully already requires a well organized hack,
  228. 65
  229. 00:04:35,920 --> 00:04:41,880
  230. otherwise we would be just blocked like Signal ads were blocked by Facebook.
  231. 66
  232. 00:04:42,760 --> 00:04:46,960
  233. On a personal level, we can start
  234. by migrating to foss operating systems
  235. 67
  236. 00:04:47,040 --> 00:04:53,320
  237. installing peer to peer and darknet apps,
  238. getting a nextcloud, a matrix, a mastodon
  239. 68
  240. 00:04:53,320 --> 00:04:55,840
  241. and even hosting our own servers,
  242. 69
  243. 00:04:55,840 --> 00:05:00,000
  244. but we won't get much use of these if we don't have a community there.
  245. 70
  246. 00:05:00,320 --> 00:05:06,280
  247. Also the learning curve is much lower
  248. when it's approached collectively.
  249. 71
  250. 00:05:06,440 --> 00:05:07,560
  251. In the end,
  252. 72
  253. 00:05:07,560 --> 00:05:13,040
  254. the greater part of the work is convincing our communities to come along with us.
  255. 73
  256. 00:05:13,280 --> 00:05:16,160
  257. There is no technical solution
  258. to a social problem.
  259. 74
  260. 00:05:16,160 --> 00:05:23,080
  261. For any of these FOSS to start genuine change, we need to reach a critical mass
  262. 75
  263. 00:05:23,080 --> 00:05:24,560
  264. with network effect.
  265. 76
  266. 00:05:24,920 --> 00:05:28,160
  267. To host and facilitate
  268. a digital mass migration,
  269. 77
  270. 00:05:28,160 --> 00:05:31,760
  271. existing infrastructures
  272. wouldn't be enough,
  273. 78
  274. 00:05:31,760 --> 00:05:35,000
  275. we would need to
  276. invest in decentralized infrastructure
  277. 79
  278. 00:05:35,000 --> 00:05:38,800
  279. and disperse the cloud
  280. by reclaiming our data.
  281. 80
  282. 00:05:38,920 --> 00:05:41,520
  283. To spread this idea
  284. and turn it into reality,
  285. 81
  286. 00:05:41,520 --> 00:05:44,640
  287. we can organize
  288. feminist hacker literacy campaigns,
  289. 82
  290. 00:05:44,640 --> 00:05:48,160
  291. not just for coding
  292. but for everything we need
  293. 83
  294. 00:05:48,160 --> 00:05:50,840
  295. to liberate and maintain our cyborg lives,
  296. 84
  297. 00:05:50,840 --> 00:05:56,520
  298. like system administration, telecom engineering, hardware assembly and repair,
  299. 85
  300. 00:05:56,520 --> 00:06:02,520
  301. and most importantly, wetware, which is
  302. the organic part of our cyborg bodies.
  303. 86
  304. 00:06:03,360 --> 00:06:07,360
  305. The intersection of feminist and hacker politics goes back to witches
  306. 87
  307. 00:06:07,360 --> 00:06:10,200
  308. who were hunted
  309. for having the power of knowledge
  310. 88
  311. 00:06:10,200 --> 00:06:14,240
  312. detrimental to capitalist racist cisheteropatriarchy.
  313. 89
  314. 00:06:14,520 --> 00:06:18,280
  315. Half century ago, when abortion
  316. was illegal in the United States,
  317. 90
  318. 00:06:18,280 --> 00:06:24,000
  319. underground Jane Collective reappropriated the knowledge of performing abortions,
  320. 91
  321. 00:06:24,000 --> 00:06:29,800
  322. to train and maintain a feminist network of illegal practitioners.
  323. 92
  324. 00:06:30,160 --> 00:06:31,200
  325. In 2001,
  326. 93
  327. 00:06:31,200 --> 00:06:36,120
  328. Gender Changers Academy started doing feminist hack workshops in Amsterdam
  329. 94
  330. 00:06:36,120 --> 00:06:40,080
  331. which then toured cities in different countries
  332. 95
  333. 00:06:40,080 --> 00:06:41,840
  334. under the name Eclectic Tech Carnival.
  335. 96
  336. 00:06:42,000 --> 00:06:47,000
  337. In 2014, Feminist Principles of the Internet
  338. were drafted in Malaysia,
  339. 97
  340. 00:06:47,160 --> 00:06:51,200
  341. meanwhile in Catalonia, TransHackFeminist convergence featured workshops
  342. 98
  343. 00:06:51,200 --> 00:06:56,520
  344. ranging from do-it-yourself
  345. gynecology to creating feminist servers.
  346. 99
  347. 00:06:56,880 --> 00:07:01,600
  348. Feminist principles of the internet
  349. on feministinternet.org
  350. 100
  351. 00:07:01,600 --> 00:07:05,760
  352. is a good starting point for imagining
  353. a feminist internet
  354. 101
  355. 00:07:05,760 --> 00:07:10,240
  356. but as it says on the Anarchaserver:
  357. "A feminist internet also requires
  358. 102
  359. 00:07:10,240 --> 00:07:13,800
  360. self-managed and autonomous
  361. feminist servers."
  362. 103
  363. 00:07:13,920 --> 00:07:17,120
  364. "This is about regaining control
  365. and gaining autonomy
  366. 104
  367. 00:07:17,120 --> 00:07:20,680
  368. in the access and management
  369. of our data and collective memories.
  370. 105
  371. 00:07:20,680 --> 00:07:23,800
  372. It is also about being able
  373. to have feminist mailing lists,
  374. 106
  375. 00:07:23,800 --> 00:07:28,200
  376. pads, wikis, content management systems,
  377. social networks
  378. 107
  379. 00:07:28,200 --> 00:07:32,840
  380. and any other online services managed
  381. by feminist tech collectives.
  382. 108
  383. 00:07:33,400 --> 00:07:37,000
  384. It is also of course
  385. about continuing to argue that
  386. 109
  387. 00:07:37,000 --> 00:07:39,440
  388. social justice in technologically driven
  389. environments
  390. 110
  391. 00:07:39,440 --> 00:07:45,440
  392. needs a more gender and culturally
  393. diverse presence in general."
  394. 111
  395. 00:07:46,520 --> 00:07:50,680
  396. Today there are a few feminist hacklabs and feminist servers
  397. 112
  398. 00:07:50,680 --> 00:07:57,040
  399. that are doing a very important job by setting paradigms and leading by example.
  400. 113
  401. 00:07:57,840 --> 00:08:02,160
  402. What we need urgently is
  403. the popularization of these practices
  404. 114
  405. 00:08:02,160 --> 00:08:05,840
  406. by sharing material, technical
  407. and emotional resources.
  408. 115
  409. 00:08:05,920 --> 00:08:10,000
  410. To have our own infrastructure,
  411. we have to make a collective decision
  412. 116
  413. 00:08:10,000 --> 00:08:11,480
  414. to invest in it.
  415. 117
  416. 00:08:12,200 --> 00:08:16,560
  417. In the article "Feminist autonomous infrastructure: from zombies to ninjas"
  418. 118
  419. 00:08:16,560 --> 00:08:20,760
  420. it explains how volunteering risks invisibilizing labor
  421. 119
  422. 00:08:20,760 --> 00:08:26,440
  423. and donation campaigns are not enough
  424. to sustain feminist infrastructure projects.
  425. 120
  426. 00:08:26,960 --> 00:08:31,760
  427. The article titled "Feminists are building
  428. their own technology to organise
  429. 121
  430. 00:08:31,760 --> 00:08:37,760
  431. but where are funders?" explains how
  432. a feminist server project ceased to exist
  433. 122
  434. 00:08:37,760 --> 00:08:39,680
  435. because it lacked proper funding.
  436. 123
  437. 00:08:40,160 --> 00:08:43,720
  438. "The internet, like
  439. the streets, needs to be reclaimed.
  440. 124
  441. 00:08:43,720 --> 00:08:47,720
  442. We can build new spaces of engagement, organizing and transformation
  443. 125
  444. 00:08:47,720 --> 00:08:48,640
  445. but in order to achieve this,
  446. 126
  447. 00:08:48,640 --> 00:08:54,160
  448. we need funding that can ensure
  449. those building the feminist internet
  450. 127
  451. 00:08:54,160 --> 00:08:57,840
  452. that they can make decisions
  453. over where their knowledge goes."
  454. 128
  455. 00:08:58,360 --> 00:09:02,000
  456. A server can cost less
  457. than the cheapest smartphone
  458. 129
  459. 00:09:02,000 --> 00:09:05,400
  460. or cheaper
  461. if you use a second hand computer
  462. 130
  463. 00:09:05,400 --> 00:09:08,480
  464. but we also need the funding
  465. to spread the idea
  466. 131
  467. 00:09:08,480 --> 00:09:12,960
  468. and give people the time and space
  469. to learn, exercise and develop.
  470. 132
  471. 00:09:13,320 --> 00:09:17,080
  472. In cities like Barcelona where
  473. every neighborhood have feminist groups,
  474. 133
  475. 00:09:17,080 --> 00:09:21,320
  476. every neighborhood can have a feminist
  477. hacklab with servers that federate.
  478. 134
  479. 00:09:21,320 --> 00:09:24,480
  480. For neighborhoods that don't
  481. have a secure physical space,
  482. 135
  483. 00:09:24,480 --> 00:09:32,800
  484. bigger feminist organizations like Ca La Dona
  485. can share VPS and other services.
  486. 136
  487. 00:09:32,880 --> 00:09:37,160
  488. Every feminist group should have access
  489. to feminist servers,
  490. 137
  491. 00:09:37,160 --> 00:09:41,840
  492. if they're too small or ephemeral and can't afford to have their own,
  493. 138
  494. 00:09:41,840 --> 00:09:46,840
  495. they should be able to find help from other feminist collectives that share services.
  496. 139
  497. 00:09:46,840 --> 00:09:49,560
  498. Bigger feminist organizations in
  499. more privileged parts of the world should
  500. 140
  501. 00:09:49,560 --> 00:09:56,040
  502. also have programs to share services with
  503. the feminists from rest of the world.
  504. 141
  505. 00:09:56,320 --> 00:10:01,040
  506. Feminist infrastructure and servers
  507. should be seen as a necessity,
  508. 142
  509. 00:10:01,040 --> 00:10:04,240
  510. especially for separatist feminist groups.
  511. 143
  512. 00:10:04,440 --> 00:10:09,040
  513. We can't have truly no-mixto spaces
  514. on vectoralist platforms, because there
  515. 144
  516. 00:10:09,040 --> 00:10:15,920
  517. even our close groups and personal
  518. messages are exploited by white cis men.
  519. 145
  520. 00:10:15,920 --> 00:10:19,640
  521. On the other hand,
  522. imagine an internet without cis men at all,
  523. 146
  524. 00:10:19,640 --> 00:10:22,200
  525. and believe that
  526. we can create it together.
  527. 147
  528. 00:10:22,600 --> 00:10:28,080
  529. To realize that dream we don't need
  530. a new technology, we need a new culture.
  531. 148
  532. 00:10:28,920 --> 00:10:33,960
  533. Hacker class consciousness must be a part of our intersectional feminist consciousness.
  534. 149
  535. 00:10:34,560 --> 00:10:37,880
  536. We can update our
  537. consciousness raising practices
  538. 150
  539. 00:10:37,880 --> 00:10:42,400
  540. by including conversations about how vectoralism effects us personally
  541. 151
  542. 00:10:42,400 --> 00:10:46,920
  543. and sharing the knowledge of
  544. how to hack it for good
  545. 152
  546. 00:10:47,200 --> 00:10:50,040
  547. with care
  548. and not condescension.
  549. 153
  550. 00:10:50,400 --> 00:10:56,880
  551. We can throw crypto install parties
  552. combined with tupperware/sex parties
  553. 154
  554. 00:10:56,880 --> 00:11:00,760
  555. where we demonstrate
  556. signal blocking pouches, tails sticks,
  557. 155
  558. 00:11:00,760 --> 00:11:04,520
  559. single board computers,
  560. linux phones, etc.
  561. 156
  562. 00:11:04,520 --> 00:11:06,800
  563. When we do these parties
  564. at each others homes,
  565. 157
  566. 00:11:06,800 --> 00:11:10,360
  567. we can help set up home servers and labs.
  568. 158
  569. 00:11:10,360 --> 00:11:14,920
  570. We can make signal blocking
  571. purses for smart devices fashionable.
  572. 159
  573. 00:11:14,920 --> 00:11:17,960
  574. Take that textile back
  575. from military machis.
  576. 160
  577. 00:11:17,960 --> 00:11:21,840
  578. If we do it on our own
  579. we could be singled out,
  580. 161
  581. 00:11:21,840 --> 00:11:24,200
  582. so we should do it as a movement
  583. 162
  584. 00:11:24,200 --> 00:11:30,800
  585. and exercise it as our right
  586. to not be accessible 24/7.
  587. 163
  588. 00:11:30,800 --> 00:11:36,760
  589. Our culture should value a repairable
  590. cheap phone with killswitches
  591. 164
  592. 00:11:36,760 --> 00:11:39,440
  593. more than
  594. the latest most expensive phone
  595. 165
  596. 00:11:39,440 --> 00:11:43,160
  597. that doesn't allow a battery removal
  598. without breaking the warranty.
  599. 166
  600. 00:11:43,160 --> 00:11:47,320
  601. Meanwhile, we can't forget
  602. where the lithium, koltan
  603. 167
  604. 00:11:47,320 --> 00:11:50,560
  605. and everthing else
  606. that goes into a computer comes from,
  607. 168
  608. 00:11:50,560 --> 00:11:54,920
  609. the people who mine it, carry it, process
  610. it, assemble it.
  611. 169
  612. 00:11:54,920 --> 00:11:58,120
  613. We must interfere with technology at
  614. every layer
  615. 170
  616. 00:11:58,120 --> 00:12:03,040
  617. from internet service provisions
  618. to supply-production chains
  619. 171
  620. 00:12:03,040 --> 00:12:06,880
  621. to stop reproducing injustice
  622. and destroying our planet.
  623. 172
  624. 00:12:06,880 --> 00:12:10,040
  625. To be able to take good care
  626. of each other and the earth,
  627. 173
  628. 00:12:10,040 --> 00:12:14,680
  629. we must cultivate our response-abilities
  630. and radically change our culture.
  631. 174
  632. 00:12:14,680 --> 00:12:18,240
  633. The future will be feminist
  634. or there won’t be future!